This IPv6 address type is the equivalent of a private IPv4 address.
What is a Unique Local Address (ULA)?
This protocol is used to securely administer remote devices and operates on TCP port 22.
What is SSH?
This is a type of phishing that targets high-profile individuals.
What is spear phishing?
This zone separates an organization's internal network from untrusted external networks.
What is a DMZ?
This is the likelihood that a threat will exploit a vulnerability.
What is risk?
This dynamic routing protocol supports classless routing and uses link-state advertisements.
What is OSPF?
SNMP uses these two ports for communication.
What are UDP 161 and 162?
This technique involves manipulating packet headers to mask the origin of network traffic.
What is IP spoofing?
These are used to define what traffic is allowed or denied through a firewall.
What are access control lists (ACLs)?
This document outlines how to restore IT services after a disruption.
What is a disaster recovery plan?
This protocol is used for loop prevention in a Layer 2 network.
What is Spanning Tree Protocol (STP)?
This email protocol downloads messages and typically deletes them from the server.
What is POP3?
This type of attack exploits a trust relationship by injecting malicious input into a database query.
What is SQL injection?
This type of security model grants resources based on job assignment needs.
What is RBAC (Role Based Access Control)?
This regulation governs the protection of patient health information.
What is HIPAA?
This WAN technology allows packet-switched communication over a public network using tunnels.
What is MPLS (Multiprotocol Label Switching)?
This protocol secures communication over VPNs by authenticating and encrypting each IP packet.
What is IPsec?
This is an attack where the hacker inserts themselves into an ongoing communication session.
What is a man-in-the-middle (MITM) attack?
This architecture uses isolated networks to contain devices with different security needs.
What is network segmentation?
This is a detailed analysis of potential threats, vulnerabilities, and consequences
What is a risk assessment?
This type of NAT maps multiple private IPs to a single public IP with unique port assignments.
What is PAT (Port Address Translation)?
This is the protocol suite used for network authentication and uses a ticket-granting system.
What is Kerberos?
This advanced attack uses malware embedded in legitimate-looking software to gain long-term access to a system.
What is a Trojan with a persistent backdoor or APT (Advanced Persistent Threat)?
This access model uses policies, tags, and context rather than roles or groups.
What is Attribute-Based Access Control (ABAC)?
This framework is published by NIST and provides guidelines for improving cybersecurity posture
What is the NIST Cybersecurity Framework?